Zobrazeno 1 - 10
of 1 655
pro vyhledávání: '"SPECint"'
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
J.K. Flanagan, M. Watson
Publikováno v:
SBAC-PAD
Trace-driven simulation is a commonly used tool to evaluate memory-hierarchy designs. Unfortunately, trace collection is very expensive, and storage requirements for traces are very large. In this paper, we introduce HACS (Hardware Accelerated Cache
Publikováno v:
Workload Characterization of Emerging Computer Applications ISBN: 9781461356417
Researchers have developed many different methods for evaluating locality, however there exists no standard method of evaluation that incorporates all aspects of temporal and spatial locality. In this chapter we introduce an advanced form of locality
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9130a5ef09079e55620bb5b5d25b10a5
https://doi.org/10.1007/978-1-4615-1613-2_5
https://doi.org/10.1007/978-1-4615-1613-2_5
Autor:
Dumontier, Michel, Arsić, Branko, Ðokić-Petrović, Marija, Spalević, Petar, Milentijević, Ivan, Rančić, Dejan, Živanović, Marko
Publikováno v:
Semantic Web (1570-0844); 2019, Vol. 10 Issue 4, p795-813, 19p
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Transactions on Software Engineering. 47:2504-2519
The Spectre vulnerability in modern processors has been widely reported. The key insight in this vulnerability is that speculative execution in processors can be misused to access the secrets. Subsequently, even though the speculatively executed inst
Publikováno v:
MPLR
Dynamic taint analysis (DTA) is a popular program analysis technique with applications to diverse fields such as software vulnerability detection and reverse engineering. It consists of marking sensitive data as tainted and tracking its propagation a
Autor:
Hing Yan Thomas To
Publikováno v:
IEEE Solid-State Circuits Magazine. 11:31-41
Advanced-computing demand has grown exponentially over the past several decades [1], [2]. Figure 1 reports computing feature trends, such as number of logic cores, operational frequency, power consumption, system performance measured in terms of the
Autor:
Pradip Bose, William J. Starke, Christian Zoellin, Ramon Bertran, Satish Kumar Sadasivam, Alper Buyuktosunoglu, Silvia M. Müller, Matthias Pflanz, Robert K. Montoye, Michael Normand Goulet, John-David Wellman, Nagu Dhanwada, Dung Q. Nguyen, Marcy E. Byers, José E. Moreira, Balaram Sinharoy, Richard J. Eickemeyer, Christopher Gonzalez, Thompto Brian W, Andreas Wagner, Karthik Swaminathan, Hans M. Jacobson, Nandhini Chandramoorthy, Michael Stephen Floyd, Jeffrey A. Stuecheli, Rahul M. Rao
Publikováno v:
ISCA
We present the novel micro-architectural features, supported by an innovative and novel pre-silicon methodology in the design of POWER10. The resulting projected energy efficiency boost over POWER9 is 2.6x at core level (for SPECint) and up to 3x at